About Me
Hi, I’m Anthony, I am currently a student at Cal Poly Pomona studying Information Security. The main point of this website is to show off some of my work, give advice based on things I’ve done within the security space, and just to yap about things I think are cool. Right now, I’m very interested in Detection Engineering and Threat Hunting. I want to make an impact in security, plus I like both offensive and defensive stuff, so I think it’s a good mix.
Certifications
| CompTIA Security+ | Red Team Operator | Blue Team Level 1 |
Competitions
Collegiate Penetration Testing Competition (CPTC) (Jun 2025 - Present)
- Performed OSINT and source code analysis on public repositories to identify initial access vectors. Exploited misconfigured databases, web apps, Active Directory, and default credentials. Audited fictional organizations for security and compliance gaps, delivering reports on risks, issues, and remediation strategies to executives.
Collegiate Cyber Defense Competition (CCDC) (Jun 2025 - Present)
- Developed custom scripts on Windows and Linux to automate vulnerability remediation and close initial access points. Managed cross-platform servers (HTTP/S, DNS, FTP, SMB, SSH, SMTP, MySQL) and supported business operations through system inventories, incident reporting, and user access management.
Information Technology Competition (ITC) - Security (Apr 2025)
- Performed internal penetration testing across Kubernetes, Active Directory, AI services, and on-prem AWS, uncovering 10+ privilege escalation, container escape, API, and identity trust risks. Authored a 50+ page technical report with executive briefings on vulnerabilities, impacts, and remediation. Leveraged offensive insights to strengthen threat detection, IR, and AD hardening.
National Cyber League (NCL) (Aug 2024 - Oct 2024)
- Completed challenges in password cracking, traffic analysis, cryptography, forensics, OSINT, enumeration, and exploitation. Used tools like Hashcat, Wireshark, and Nmap to analyze data, identify vulnerabilities, and perform controlled exploits. Conducted OSINT investigations, log analysis, and hands-on exercises to strengthen detection, troubleshooting, and exploitation skills.
You can find me on GitHub and LinkedIn. Thanks for stopping by.